Friday, December 26, 2008

Best Top Security Softwares needed to protect your Computer

Being the Computer Technology Generation, Protecting your Computer is like - you being protected with a powerful shield. Quarantining a Virus, intruder, phisher, malware is like killing your enemies. So wonder how much you need to take care of your computer’s health i.e. your health. What security softwares do I need to install in my computer to shield my PC, has been the question running in most of minds who have lot of confidential information as well as consumers who have felt prey to unethical hackers and viruses. Here are some of the important softwares that you need to install in your computer to protect yourself.

Firewall – An Intrusion Prevention System – which protects your computer from unauthorized access / intruders


Anti-virus – Virus Detection, Prevention and Removal Tool, which also protects your from worms, Trojans, Keyloggers and so on.


Anti-Malware – Protects your computer from malicious attacks


Anti-Spam – Protects your mailbox from unwanted or illegal mails


Anti-Spyware – Protects your computer from illegal spy’s which transmits your computer information to third parties


Adware Blocker - Blocks ads that come while you surf the internet


Privacy Control – Safeguards your personal information


Parental Control – You can restrict access for certain illegal, porn websites and care your children by showing them the right website (Right Path)


The above all is available as a Internet Security Suite. Other than this it is also good to have some other software which would function as a weapon and defence border security for your computer.


Back Up – A Storage and data recovery tool, in case you lose your data, it can be restored from the back-up software


Vulnerability Scanning – Its good have a periodic vulnerability scan so that you can assure that you system is completely protected from vulnerabilities


And it’s also good you step carefully while you visit websites which involves financial transaction. So when you attend banking or shopping site, check if the site begins with https:// instead of http:// and also has a golden pad lock (a lock like image) in the browser. If you click the pad lock it will say whether the site you enter is secure. So if the site is secure and fulfils the criteria then you can proceed with your transaction, so that we are alert that we won’t fall prey to the enemies i.e. Phishers.Apart from this there are so many security softwares available in the market, but the above all is considered to be the most important security softwares that will protect and shield your computer from attacks.

Wednesday, December 24, 2008

Pirated Versions of Operating System and its security threats



Many of the people worldwide use to download the cracked version of Operating Systems and install and use them at free of cost, without know what are the consequences of using such illegal pirated versions of software’s. Most of the people who want to upgrade a system, they just go online and search if there are any pirated versions of Windows or Pirated version of Linux operating system is available in the web. Though some of the Linux based stuff is available open source, its good they use it. But whereas people now stopped spending to buy the OS and start installing a pirated version, but using fake registration/activation keys.


Is that anyone is aware about what are the consequences they ought to face if they install such kind of fake soft wares. The answer would be “NO”. Let the software manufactures filing a case/suit be on one side, are you aware that you computer is vulnerable for multiple attacks. Whatever latest operating system is being released, it will have some advanced features which will mainly have security features, with automatic updates if the product is purchased. So if a person goes and downloads a pirated version of the software, then they are missing the software developers’ periodic update. The updates are done, while the developers come across some key holes, through which your computer may be vulnerable, in order to close that key hole and save you from such security threats and vulnerabilities , the developers give automatics updates periodically so that your computer is not vulnerable. Without understanding the real fact of purchasing the software, most of the people, they just feel proud downloading a pirated version of software, and even share it with their friends’ network.


Though there are some enterprises which are being sued for using such kind of pirated version of software’s, still individuals, home users and small businesses have pirated version of the software in their system as the person or service providers, just to earn, installs the fake version of the software making a statement – “Let me know if there is any problem, we will fix it” and simply goes off with his payment. But still there are genuine service providers, who priorly purchase the licenses and provide quality services to their customers. So let’s choose the right service provider herein and also meantime let’s spend some dollars to buy the software, and at least try to make good the recession with our minor contribution.

Greetings! Merry Christmas (X-Mas) and a Very Happy New Year 2009 - Yuvi


Make sure you are Safe and Secure during this Festive Season. Wishing you whole heartedly for a Precious New Year.

Wednesday, December 10, 2008

The Top 10 Worst Predictions – On the growth of Technology

In this technology world certain things cannot be predicted. Though predicted it may result adverse. Here is an extract from Indian Express – which itself has extracted from “The Daily Telegraph”. Though my blog mainly deals with internet security and related stuff, In the morning once I opened the news paper, I was really interested to share this with you. Here is the top 10 worst predictions made by experts below.

1. The iPod will never take off – Sir Alan Sugar in 2005.

2. No need for a computer in the home – Ken Olsen, founder of Digital Equipment Corp in 1977.

3. “Nuclear-powered vacuum cleaners will probably be a reality within ten years” - Alex Lewyt, president of the Lewyt Corp Vaccum company.

4. TV won’t last because people would, “soon get tired of staring at a plywood box every night” – Darryl Zanuck in 1946.

5. In 1933, after the First Flight on the Boeing 247, a plane that could hold ten people, a proud being engineer reportedly said , “there will never be a bigger plane built”.

6. “we stand on the threshold of rocket mail” – US postmaster general Arthur Summerfield in 1959.

7. Nobody would ever need more than 640 kb of memory on their personal computer – Bill Gates in 1981, allegedly.

8. “The Americans have need of the telephone, but we do not. We have plenty of messenger boys” – Sir William Preece, Chief Engineer at the post office in 1878.

9. “Spam will be solved” – Bill Gates, 2004.

10. “X-rays will prove to be a hoax” – Lord Kelvin, President of the Royal Society, in 1883.

Source: The Daily Telegraph

Friday, December 05, 2008

Virus Removal Tool | Anti Virus and Internet Security Blog Explained

Just wanted to share a blog post written by my colleague about the internet security virus removal tool. Click this link to learn more http://antivirus-internetsecurity.blogspot.com/ about Anti Virus and Internet Security Blog.

Thursday, December 04, 2008

Most Possible Internet Security Threats for 2009

Computer security threats have been increasing along with the technology growth, and high usage of World Wide Web. Though there are Internet Security Software’s including firewall, antivirus, spyware remover, adware blocker, anti-phishing tools or any other computer security products, still there is a risk if the software is not up-to-date. As there is increase in new threats such as viruses, Trojans and worms which infects a PC fast, before the software providers can get a signature to neutralize it. Once the signature is updated, and the software has got an option of automatic updates, then our computer is safe, as the security threat can be neutralized or even quarantined to make the computer safe and secure from further infections. So it has become an utmost importance for the computer user to be aware and secure while surfing the internet.

The other reason why there is increase in the online theft & easy injection of malware into the computer is because of the increased usage of fake pirated version of software in PC system. If a person uses a pirated version of software, then the risk of virus affecting the system is high, due to lack of periodic updates. So it is always to good spend some $10 to buy a real version of software, instead of losing $100 using a pirated version of software. Coming to the predictions for 2009 the Internet security threats and Vulnerabilities may include

Increase in Phishing attacks (Stealing the Identity online) Also see types of phishing.

Increase in Pharming attacks (Hacking done by redirecting the website traffic to a genuine website to a bogus website)

Increase in Instant Messenger Attacks (The online culprits use to send worm or Trojan, which sends automated messages to the people in address book, when the user is online/offline, and when the receiver opens the instant message, and click the link specified in the message, it will again go the recipients present in their address, like a chain)

Increase in Email Spam (Phishers and Hackers try sending out spam – fake messages attached with some virus, spyware, Keyloggers or Trojan trying to make computer users to fall prey them)

Increase in online pop-up ads (Some companies give free software, along with adware, which notifies the company of what the user is typing or searching in the internet, who inturn send pop-up messages, and promotional materials to the computer user which may make him/her disgusting and who need to be ad aware from such adware’s)

Increase in vulnerability attacks (This may be in any of above said forms. Sometimes the Operation system is vulnerable to attacks, if there is no proper protection)

Increase in other such crimes via online internet gaming, pornography etc.

The above said is the possible internet security threats based on the present scenario. In simple, the present threats will increase in future, pertaining to the development in technology.

Wednesday, November 26, 2008

Event: Anti-Virus Researchers International Conference

One of the largest Asia-Pacific conference to discuss regarding anti virus and anti malware technologies, is going to be held in New Delhi, India, between 10th and 12th of December 2008. The experts from top antivirus software development companies would be presenting papers related to the future of anti virus, malware protection etc. Moreover the huge internet security software giant’s including F-Secure, K7 Computing, Symantec, Trend Micro, Norman, AVG, Kaspersky would be participating in AVAR 2008.

Some the topics to be presented will include

New Malware, New Environment, New Testing Standards by David M Perry (USA), Global Director of Education, Trend Micro.

Exploiting Anti-virtualization Techniques to Prevent Running of Malware by Andrew Lee, Chief Technology Officer (CTO) of K7 Computing (India).

Anti Malware Testing Standards Organization (AMTSO): The Status Right Now by Righard J. Zwienenberg (The Netherlands), Chief Research Officer, Norman. President, AMTSO

Cyber Terrorism by Swanand Dattaram Shinde (India), Software Engineer, Quick Heal Technologies.

To know more about the Association of Anvi-Virus Asia Researchers International conference & sponsors visit: http://www.aavar.org/avar2008/sponsors.htm

Monday, November 24, 2008

Future Trends in Internet Security

Internet is one of tremendous achievement in the recent history since the computer age started. In the beginning, when the internet was structured the commercials were not allowed. But later internet became one of the backbones for industries, shopping, banking sector and for other commercials, which resulted in high business and at the same time paved way for cyber crimes. Though in earlier days the rates of cyber crimes were less, now the advancement in computer software technology has substantially increased the online crimes causing serious cyber security threats. Now internet network is one of the most importantly considered infrastructures for commercials globally, if this is not secured properly, not only ecommerce is at risk but also the life of humans can also be at stake. That means the future is at risk without security.

Drawbacks of Unsecure Internet
An Unsecure internet is like a human without dress. So if internet is not secured then any one can trespass to connect to your computer over internet and steal your information. So internet security has become a greater challenge for both personal and commercial use. If a computer connected to internet is not secured, then it is vulnerable to multiple attacks which include packet sniffing, phishing, TCP / IP hijacking & Spoofing, redirecting the router and other such kind of active attacks. So a proper and secure infrastructure can alone prevent such kind of active attacks.

How to secure the internet from Vulnerability?
By analysing the past and present trends in the internet security, the experts have come with a new scenario about the future of internet security. The scenario when overlooked would be simple to read but it’s difficult to implement, unless and until, we people (internet users) are aware about it. The future IT trend will give the solutions that provide additional layer of security to the computer and internet. The recent IT trend is focused mostly on the future security measures which may include

1.) Website Security – Secure Sockets Layer, Web Internet Protocol (IP) Security

2.) Web Application Security - Web penetration testing, Denial of Service attack, Web Server Firewall, Protection for programming languages used in websites e.g. java, html etc used for designing the website.
3.) Desktop Security – Internet security suite, Firewall, Antivirus, Anti Spyware, Anti – Malware, Adware protection, Vulnerability Analyzer, Security based PC Utilities, Anti Spam including PGP / Smime e-mail

4.) Infrastructure Development for Enterprises – Biometric Authentication, Smart cards, Access Control

5.) Implementation of ISO (International Organization for Standardization) Model in Organisations

6.) Wi-fi or Wireless Security

Technically speaking, there are lot of confusions of what layer of security is required, or which kind of certificate is appropriate for PKI – Public key infrastructure, those suites globally and so on. Also the security measures that needs to be considered for extranets and intranets, which leads to a question of authentication level. So when a proper analysis is being made for security verticals including wire-less communications will provide a solution with key advantages. So for the base of website security the encryption and decryption level needs to be suggested by cryptographic experts. When it comes to computer security, it’s the effective desktop security solution that needs to prevent / protect an unauthorized access. This is because if the computer is vulnerable only there would be an unauthorized access, so if a comprehensive internet security suite is being installed in the computer, it works as a guard to the computer, prevent such vulnerable attacks and more over defending and shielding the computer from malicious attacks.

Though the government and internet councils has been trying to regulate the law of encrypted internet still it’s a very difficult task for them, due to lack of awareness. So once the awareness is being created, then we can assure that the future is secure. From present to future these changes will happen gradually from tiny to complex security. If any organisation wants to monopolize their security applications, then we are not getting the better security solution. The reason is more the competition is; better the product would be. So let’s welcome competition.


- Yuvaraj
Hermesmyth
Your Marketing Partner
http://www.hermesmyth.com

Wednesday, November 05, 2008

Top 10 Reasons to have an Internet Security Suite

There might be thousands of reasons to use internet, but I would like to tell the top 10 reasons, to why you should have an internet security suite installed in your computer.

1. To safeguard yourself from hackers and phishers
2. To protect your identity and confidential information
3. To stop viruses, Trojans, Keyloggers, spyware and other malicious program running in your computer
4. To manage and prevent buffer overflow attacks
5. Parental and Privacy control
6. To stop unauthorized intruder accessing your computer
7. To avoid unwanted system crashes happening due to changes in the systems security settings
8. To prevent yourself from unwanted network, web-access and email traffic
9. Web Content-Filtering
10. For you to have COMPLETE PEACE OF :)
- Yuvaraj
www.k7computing.com

Monday, November 03, 2008

Types of Phishing Methods, How to report Phishing attacks?

Before we start proceeding with the types of phishing, let’s understand what is phishing? Phishing is a kind of online fraud or theft committed in disguise over the internet. The interesting thing here is phishing websites are live just for an average of 6 hours, though the latest trends report that an average time a phishing website online is around 3.8 days, with one or two updates. Within this time line lakhs of internet users fall prey to the phishers. You may ask me, is there a way to stop falling prey to the phishers completely. My answer would be a big “NO”, because most of them are not aware about what are phishing attacks, and the approach of the phishers. Once people, I mean the Internet Users are aware about the phishing technology used, then on an average of 75% of cyber users can be safe.

I see most of the people can live without a girl friend, but not without a internet says one of my blogger friend in his Everything about security blog under the topic Internet Security – The Purpose Internet Security Market Computer Security.So let me explain certain methods a phisher or an online thief uses.

Types of Phishing attacks

There are different methods of phishing; a phisher counterfeits to steal an identity and confidential information. The phishing methods include

Deceptive Phishing – is a method in which the phisher creates an email messaging stating that account is expiring or suspended and some other reason, with a URL, which intends to be looking like the original website. But if clicked the site will be redirected to a fake URL. For instance, if a original site is http://www.example.com/, the site will take you to www.fake.example.xxxxx.com/jfj387e3fd or so. So if the user gives the information, he would be falling prey to phisher.

Also see how the a phisher shoots email and website claiming to be from Axis Bank formerly UTI Bank here - http://yuvi-internetsecurity.blogspot.com/2007/03/uti-bank-be-alert-and-be-safe-from.html

Malware Phishing – refers to malicious software based phishing attack. The phisher creates some malicious software in form of exe and injects it into a user’s PC over the internet. So malware, gathers all the necessary information and sends it to the third party, i.e. the phisher.
Trojans and Worms Based phishing, mostly commonly enters in to the user’s PC via email or some other unwanted website, when the users downloads an email attachment or so invisibly and collects the confidential information from the user’s computer and transmits it to the phisher.

Spyware and Keyloggers are also kind of malwares, which monitors the systems activities and note the keyboard impressions and send it to the phishers. The phishers will use this key typed data and recognizes the password to hack a computer.

Online Session Hijackers monitors the users activities, and targets the sign-up, sign in times, once the session is started, the virus or worms make an unauthorized transaction without the user’s knowledge. The User would be realizing that additional funds have been transferred to some other unknown account, only when he sees the transaction receipt or statement.

DNS Phishing Method is a method where the host file is being poisoned with some other bogus fake address. A fake website is created like the same original website, and when the users believes it to be a real website and enters his confidential information he/she falls prey to the phisher. This is also known as Pharming, as a fake website is being created and managed by a phisher to steal user’s identity.

Faulty Website Phishing – A phisher registers with a website address similar to the one already available in the website. For example – my original website would be http://www.ezencrypt.com/ whereas a fake website would be created in the name http://www.ezncrpyt.com/ ,which ad user won’t be able to identify it, as the name is similar. Also sometimes, when the URL is being added in the favourites in browser would be changed with the faulty website, and the phisher would be easily able to gain access as the user believes that it is from the favourites, and a true website he added to the favourite folder.

Content Injection Phishing is a method where the phishers gains access to a legitimate website and changes the content of the page, with his fake content to redirect the website visitor to his fake website, to gather their information steal their identity.

Man-in-the-Middle attacks – is a kind of phishing attacks, where a phishers plays the role of an intermediate between two users to complete an transaction, and once the any of the users go offline, they will secretly collect all the information and sell or use it for stealing financial information. This kind of phisher are difficult to identify as the transactions would be completed success but later only realised that some confidential information has reached to a third party and used when the users system is inactive.

There are also phishers who creates website more attractive, stating that they can purchase things at attractive discounts using their credit cards and so. When the user gets attracted to the phishers discount offer and purchases, the credit card would be charged, but they won’t get the material or the product ordered, and finally realize that there is not physical address existing for that website.

How is a phishing attack reported?
If you find or feel that seems to be phishing website you can report it to APWG (Anti-Phishing Working Group). The life of a phishing website is minimal because, if suspected, the criminals would be caught red-handed easily. So they make it live for few hours, shoot an bulk emails, see how many people fall prey to their attack, gather the information, steal their identities , financials, and anything that is possible and make the website inactive. The mail would be shot to thousands and lakhs of internet users, out of which a few might report it and the site shut down process and tracking the criminals would be taking place. Say for example if an phishers creates a fake website for online banking or online shopping site, and shoots out a bulk email, they customer may report it to the concern organisation, bank or shopping site domain holder. So the domain holder will report it to the local Computer Emergency Response Team, who will in turn check out and report to the cyber crime authorities, and the cyber crime police authority will check from where the website is hosted, and asks the concern ISP to stop or de-activate the IP, and see who has did such kind of fake website and nap the thief. Because of getting caught the phishers make the site active only for few hours.

Also we have been updating the virus news and vulnerability news in www.k7computing.com under the topic virus and risks, thought you would be interested in knowing the lastest security threats news. :)

Also know more about adware, spyware, virus, rootkits, trojans, firewalls at http://yuvi-internetsecurity.blogspot.com/2008/10/adware-spyware-firewall-antivirus.html

Sunday, November 02, 2008

Endpoint Security PC Protection – Anti Virus, Anti-Spyware, Firewall –Intrusion Prevention, Anti Malware Software Program

What is End-Point Security?

End-Point Security is the measures that are being taken to access the risks at endpoints and protect them. In simple words, endpoint security is the security implementation methods concerned to prevent and protect the network, which include the Enterprise firewall systems, client antivirus with anti malware software program, spyware detection and removal tools to prevent intrusions (Access Control) and delete i.e. quarantine the unwanted programs such as viruses, worms, Trojans, malware, spyware, adware and other hacking tools trying to get unauthorised access to the computer. An effective Endpoint Security system monitors the risks, takes the necessary security measures and also has a reporting system to provide the results of the security measures taken by the end-point security system (Firewall, Antivirus, or internet security suite) through log files, which would be used by the management and administration, to make more effective build.

What is the benefit of using an Endpoint Security System?
The security threats and vulnerabilities are always in an increasing rate day-to-day. So it has become essential to protect the WAN (Wide Area Network) and LAN (Local Area Network) Endpoints. So an Effective Endpoint Security if implemented maintains a safe productivity level and helps the businesses to improve their business results by preventing losses that occur due to vulnerability and security incidents happening over the computer network.

What are the current security threats and vulnerabilities?
New types of internet security threats are emerging on a regular basis, which makes our computer vulnerable to hacker attacks. The vulnerabilities include buffer overflow attacks, key-loggers (Key Stroke Loggers), spam emails, email worms, zombies, Trojan horses, DDOS Zombies host, spyware, adware’s, malware and so on. Also nowadays many of these types of vulnerabilities and threats are being injected into the computer, when a user downloads a free software, or gaming, or porn websites, and even via unsecure emails, which causes disruptions to the endpoints. Since most of the business transactions are being transmitted over the network, the endpoints have now become the primary target to phishers and hackers. So the enterprises needs to confront for the endpoint security systems to secure the core business related materials and confidential information. Click to view the current internet security threats and vulnerabilities.

Endpoint Security System – What does it consist of?
An Endpoint security System tools include Client Antivirus, Firewall – Host intrusion prevention system, Anti-Spam with Email Scanners, Anti-Spyware removal tool, adware blocker tools, root-kit prevention, anti-Keyloggers programs, endpoint vulnerability assessment tools, patch management remediation programs, client remote access (IPSec VPN , SSL VPN ie. Secure Sockets Layers Virtual Private Network), Regulatory Compliance, Endpoint management and policy enforcement, host detection and compliance, endpoint policy development and communications, Reporting and logging security threats and vulnerabilities, and action taken to prevent them.

Saturday, October 25, 2008

Cyber Criminals and Internet Security

Today internet has become one of the most essential parts of the human life. Any small or big information that needs to be known is got in a fraction of seconds over the internet. Why Internet? – Because internet is a vast source of data and information. So let it be a shopping, banking, education, games, email or anything else, people just login to their computers, connect to the internet and source the information by just logging in to their online accounts. Just a small wonder, the prefix “www” we type in the address bar itself says “world Wide Web”, which says World Wide Information resource. So to safe guard the vast information resource, cyber security had been made the essential part of the internet, by the internet security industry.

Internet security industry as a whole compromises of internet security tool & applications, software and hardware development, new government rules and regulations, website security, network security and all the other things that is related to the internet. There are so many internet users prone to cyber attacks and become victims of identity theft. That is because people are not aware about the cyber criminals, waiting around in the internet to capture their data. So there is a need to educate the people about Information Security, and the enterprises, banking industry, Shopping portals, email service providers and all who have an online source have started alerting their customers, and their website visitors stating what needs to be checked while logging in to their accounts and so on.

How do cyber criminals act?

Cyber criminals pose to be “Phishers” or “Hackers”, who try to intrude into your network to gather all your personal and confidential details, for the sole benefit to acquire financial related information. To capture your data, cyber criminals, try to run spy bots- in a user’s computer by combing some spyware programs along with some freely available software. Once the user downloads and installs the software, the spyware also gets installed without the user’s knowledge and starts capturing all the information in the user’s computer and transmits the information to the third parties who we term as Cyber Criminals. So with the information the cyber criminals receive over the network, are used illegally to access the account of an unknown person, and take the necessary data, finance etc and elope. Finally the person who lost his money recognises that his identity is stolen. Not only the cyber criminals uses spywares, spy bots but also adware, viruses, worms, Trojans, Rootkits, key loggers and so many possible ways to hack a computer over the internet.

How to shield your computer from Cyber Criminals?

As the identity theft has increased today, the internet security software and hardware providers have been bringing many advancement to erode the activities of cyber criminals by providing latest internet security suite which include Anti-virus, firewall, antispyware, adware removal tools, parental control, backup, privacy control and many more computer security tools to shield a computer. Not only that many web services security companies along with webhosting companies provide measures for securing a website, and to prove its identity, and more over with antivirus solutions to protect the user’s computer, while uploading the relevant files to make a website live. Also many internet security forums, and consumer security forums, corporate, banks, educational institutions and all other people who are engaged to do business online has started creating the awareness to the consumers / customers, so that they won’t fall prey the phishers or hackers.

As a part of internet security awareness program, being a part of K7 Computing, I would like you to suggest K7 Computing Total Security, an internet security Suite, for you to have an enhanced and advanced protection for your computer.

Wednesday, October 22, 2008

Adware, Spyware, Firewall, Antivirus, System Monitor, Privacy, Parental Control Software – A Glossary

Adware
A form of advertising that is being integrated in most of the free software’s. They are usually commercial banner ads or popup advertisements, which slows down the system process. Adware gets installed without the user’s knowledge, when the user downloads certain free software for his own purpose.

Adware Remover
Adware Remover or Ad-ware removal tools are kind of internet security tools which prevents and protects a user from adware’s getting installed without his/her knowledge, while downloading free software’s over the internet. An Adware removal tool is also known as Adware Blockers.

Spyware
Spyware is a form of software that gathers the computer activity and information secretly and transits to third parties when a user surfs the Internet. Spyware gets downloaded and installed automatically without the user’s knowledge.

Anti-Spyware
Anti Spyware or Spyware Removers is software that is developed to detect and remove spying software being installed in a computer. Notably most of the spyware removal tools are developed in a way that it not only eliminates spy bots but also malwares, key loggers, root kits, browser hijackers, worms, Trojan horses, and other potential computer viruses.

Malware
Malware is termed as Malicious Software. Any software that is designed to disrupt a network, in the form of viruses, worms, Trojans, or any other illegal programs is termed as Malware.

Key Loggers
Keyloggers are programs that are being installed invisibly in a user’s computer without his /her knowledge to record the entire keyboard / keystroke activity, and pass it on to third parties, online thieves such as phisher or hackers.

Root Kits
Rootkits are small programs designed to steal passwords, and other confidential information from a computer, without the users’ knowledge. These Rootkits captures the user’s personal and confidential information and transfers it to hackers.

Firewall
Firewall is also known as hacker intrusion prevention system or access control software. A firewall monitors the system traffic and alerts the user when there is some suspicious network that tries to gain access to the computer. There are two types of firewall – Hardware Firewall & Software Firewall.

Anti-Virus
Antivirus is a software program, which scans, detects, and prevents a computer from potential virus attacks. Nowadays most of the Antivirus software comes not only with Virus protection tools, but also with adware protection and spyware prevention tools.

System Monitor
System monitor are application that are being installed in a computer, to monitor the entire performance and activity of a computer, and alerts the user when any miscellaneous application is trying to change the computer’s security settings.

Privacy Control
Privacy control provides security for the users by providing him/her a security space to store all his personal / confidential details such as passwords, social security numbers and so on, which can be accessed only by the specified user.

Parental Control
Parental Control is a feature mostly used by parents, to block certain illegal, porn, gambling and other insecure websites, while their children surf over the internet. Nowadays privacy control and parental control features comes along with any internet security suite software’s.

Tuesday, October 21, 2008

Greetings! Happy Diwali Wishes! Have a Safe & Secure Diwali

The festive season has begun in India, now it’s the festival of lights – Diwali. People have started getting so many diwali greetings and product discount offers over email. Keep in mind this is the time for business and purchases, and also a hacking ground for phishers. When you receive an email stating, that you have won a lottery or get heavy discounts and you are interested to purchase, see if the website is secured with SSL (Secure Sockets Layer) certificate. And also I wish you need to have an updated trusted version of desktop security products like anti-virus, firewall, anti-spam and so on. Because if a phisher tries to send a fake email or email with virus, Trojans, it would be quarantined or blocked by the help of internet security desktop products installed in your computer.

And people who wish to do physical shopping be aware that there might be pick-pockets/ thieves in crowded areas, who steal your wallet. If you have got debit cards, credit cards in your wallet and you wallet gets stolen, be sure you call the concerned back customer care to block your card. And also don’t reveal your password or the three digit secret pin behind your credit card to any one, because that may lead to misuse of your card.(Might be a person who sees the card number and hears the pin, then he may use it in online shopping portals easily). Have a Safe and Secure Shopping and enjoy your festive season.

Wishing you all a Very Happy, Safe and Secure Diwali (Deepavali) :)

Saturday, October 18, 2008

Parental Control, Privacy Control Software – Is that really necessary?

The answer for parental control is YES! Nowadays most of children in the age of 3 itself start using the computers, for game or fun. Recently I visited one of my friends house, and was surprised to see that his 6 year old son, came from the school, and asked “Dad, Is the computer ready?” and my friend replied “Yes”. And his son threw the bag, went had his biscuits and sat in front of the computer, switched on, and asked “Where are the games?” As my friend replied, as the computer crashed, all those gaming software being installed were lost. The little boy without hesitating, said ok, and just opened the IE (Internet Explorer) browser, typed http://www.google.com/ in the address bar, and was searching, free games. Within a fraction of minutes, he just went into a website and downloaded the software, installed and started playing the games. Here is how the problem starts, the kid he knew only to download the software, whereas he is not aware of the prevailing internet security threats or any other thing. So the parents should set an access control to the websites they enter. So the access control software we term as Parental Control.



Parental control or privacy control is an essential feature because, the parents can set some rules stating that the children can access only specified sites and block access to pornography etc. Most of t he children they come to the gaming sites to play some online games, the thing is suddenly a window pops up with porn picture or so, and even asking to download a new game, which may consist of some viruses or Trojans in it. So the children unknowing as an entertainment download them with an interest to play a new game. So parents need to concerned about their child’s online security, have some restrictions. Also it’s a responsibility of a parent to have an internet security suite which has privacy / parental control feature in it, and also the suite will have virus removal tool, with firewall – to stop unauthorized traffic entering your network.



There are a few internet security software companies like K7computing, providing advanced level of parental control in its Total Security – internet security suite. K7 Total Internet Security Suite has a privacy / parental control with features, where you can allow and block websites and also allows the user to set a timer, from when to when the internet can be accessed. This is very useful for parents, who have children spending time in the online internet games for long hours. The parents can set the time to grant / restrict access to the internet to their children between two specified time. Say for example, Grant internet access between 1 PM to 3 PM only, so after 3 PM, the internet will get disconnected. This is an advanced feature in K7 Total Security.
Also it is good to advise the children not to download anything without their (parents) knowledge so the computer won’t be affected by any miscellaneous operations. Also I wish you read an general instruction about mobile security ,which we need to be aware of being a mobile phone user.

Tuesday, October 14, 2008

Measures for safe and Secure internet and computers

The world is now connected to the internet, and almost 65% of the world population has started using internet as the mode for communication, banking, shopping and so on. In olden days all the official and personal data are being hand written or type-written in papers. So if an thief wanted to steal the data he needs to come, break the door and steal some confidential data and use it. So there were security guards and burglar alarm being placed to prevent, protect and safeguard from theives. But now the paper age has gone and computer age has boomed with recent technology developments. Since the invention of internet in 1957, when the soviet union started sputnik 1 its first satellite to beat the United States space, the internet age started. The invention of the internet made an easy choice for the theives, who we term as hackers (Online theives) steal the data from computers using the internet gateway. So to safeguard against data theft, we need to prevent and protect our computer from such kind of phishing and pharming attacks. I wish you can download your free trial version of Total Internet Security Suite, to check how it works and safeguards your computer.

So what is the security measures that needs to be taken to prevent identity theft?

As said earlier, in olden days we used security guards to protect an theif entering our office, likewise we need to have an protection software i.e. access – control software to be installed in the computer to prevent an hacker entering our system/network. So proactively an Desktop Firewall software needs to be installed which functions as a hacker intrusion prevention system. The firewall alerts the user whenever some one is trying to access our computer. So its our choice to allow, deny or block access to our computer network.

If at all, an thief enters in our office in disguise, showing an fake identity to the security guards, and once the security guards, knew that a thief has entered the office showing a fake identity, they will need to get alert and start detecting and prosecute the theif, and leaving him behind the bars. So comparitively if a user unknowingly allows, an application to enter into the system, and comes to know there is some changes happening in the computer automatically without the user‘s knowledge, the user needs to get alert on the issue. As the hackers, phishers try to get into the system writing some mailcious Software program ie. Malware or by using spyware, virus, trojans, worms etc to fetch the confidential data from the users computer on the backend. So inorder to detect and quarantine an unwanted program from our computer, an anti-virus software needs to be installed. An anti-virus software functions as a detection and virus removal software. Also some antivirus software comes with a Spam control option, where it would actively stop you from receiving spam mails, by blocking them.

Like having the burglar alarm, security guards and cops to safeguard your premises, its always good to have internet security suite as a computer security program, to prevent unethical hackers, known and unknown potential viruses and so on to have a safe and secure internet access in our computer. To prevent and protect is always better then cure. So its a good thing to have a computer security software, which acts as a protection, prevention, detection and cure tool. The recent IT trends has been giving so many technologies such as wireless internet access, laptops and so on, which is misused by the phishers causing serious internet security breaches. Though the internet threats are increasing day-by-day, as a user we need to be aware about internet security threats and protect ourselves from getting into the prey for phishing and pharming attacks.

Yuvaraj : K7computing.com

Wednesday, July 23, 2008

Recent Internet Security Threats and Predictions for 2009

Like the growth and latest developments in the technology, the worldwide internet security threat activities are also on increase. Since the day the Internet emerged to till date, the users are vulnerable to attacks by one way or the other. Though there are advanced internet security software technologies growing on the parallel side to crush or kill those internet security threats, till the spammer and the phishers are not ready to give up and continue with the phishing attacks, network-attacks & spamming by giving out malicious i.e. malfunctioning codes. Likely this sounds as a “Chase and Run” of the internet security software providers, the phishers and the spammers.
To point out, most of the internet security threats including the recent threats for 2008 is due to the malicious activity. The malicious attack or activity not only include malware attack activity but also includes phishing, pharming attack, zombie, virus, spam, malicious code, command and control over server activities and so on. The question is why these (PC’s / Computer) systems are prone to such kind of attacks? The answer is pretty simple, because they are vulnerable i.e. Susceptible to attack. So the solution bought to overcome this kind of Vulnerability is the Intrusion Prevention System, IDS in short. The IDS is nothing but the Access Control Software namely a Firewall, which prevents an intruder from entering into your system using spam bots or any other means.

The most recent on-going internet security threat attacks, where consumers use to fall prey are the data breaches which lead to identity theft. This identity theft is done when the Web browser or the plug-in or the Web application is vulnerable. Also nowadays hackers use site specific and do cross site scripting to acquire the confidential information of a user. This kind of cross scripting is done mostly for the banking sector. To resolve this kind of website or web browser vulnerabilities, the SSL (Secure Sockets Layer) certificates are being implemented to have a secure session where the website address beings with Https:// instead of Http://. Later the EV SSL Technology i.e Extended Validation SSL certificates have been initiated by a internet security software development company, known as Comodo, which formed the CAB Forum i.e. Certification Authorities and Browsers Forum to provide High Assurance stringent validation certificates. After such a hard time defense against the Zero-day attacks, patch development vulnerability, phishing attacks, pharming attacks and malicious code attacks till date of 2008, now security professionals and analysts have started working out for the internet security threat predictions for the year 2009.

As far as the prediction made, there would be more and more internet security threats would be similar to the recent threats along with the form of virus, worms, and spam bot-infections etc. And most of the attacks would be made by the phishers sector wise which involves huge financial transactions and mostly using the cross site scripting. Also Phishers have begun targeting the top countries and host companies which may result in severe attacks in future. So unless and until the user, let them be a consumer, bank, institution, or a corporate know about the vulnerabilities prevailing, the attacks can’t be prevented. So consumers need to be educated on the security measures and the authentication models before they become the victims of identity theft or network attack. To be on the safer side corporate’s also need to prevent themselves and protect their consumers to have a good business.

Tuesday, May 27, 2008

Internet Security Principles in Banking Technology & Recent Phishing Method

Recent IT trends has given special focus on the internet banking security principles inorder to prevent consumers falling prey to the phishers while banking online or involved in any such financial transactions. Recently the banks has been providing their customers with certain Online Banking Security Guidelines while opening an general banking account or Online banking account as a measure of creating online banking security awareness among their consumers.

It is evident from the most recent phishing attacks worldwide that online banking constitutes different risks for which the banks have to take some countermeasures to safeguard their consumers from such kind of internet security threats. The banks also need to be ready to identify the treat and defeat them as well as if there is any such incident that happens in spite of such kind of internet attacks (eg.hacking) the bank should be ready to respond to it immediately by either disruption of banking services, before the hacker can use or materialize that information which the hacker hacked from the online banking user (i.e. Consumer / Banking Customer).

Deceptive phishing has been the recent online banking threat, where a mail is being to sent to your inbox, claiming that its from the bank (which the user holds an account with), and states due to some reason like up gradation or some change you need to sign in to your account using an website, which is being linked to the hacker’s server. Once the user without verifying the security credentials logs in to the account, all the information including the transaction password would be re-directed to the phishing server, and the the hacker uses the information and steals the money from your banking account. For example, recently I received many emails to my inbox claiming to be from Axis Bank but they are not, asking me to upgrade the account. Some time back I got an mail from UTI Bank – Now Axis Bank, regarding the same, which means the phishers are updating all the logos, etc on a regular basis to make us fall in their cage. But we ought to check out the security credentials such as pad lock, the website address in the address bar, if via email, whether it is really from the bank or so on. Also read about the fraudulent email which I received sometime back from UTI Bank – Now Axis Bank, and again I received similar kind of email from Axis bank with the updated name. Here’s the link for you – UTI now Axis Bank Fraudulent Email.

Also I wish you would be interested in getting some free software download as a measure internet security & Personal Computer Security visit www.ezencrypt.com and also buy your SSL certificate now at cheap costs here.

Friday, February 29, 2008

Enterprise Information Security and its Standards | ISO and CMM Cerfications | VPN and Enterprise Security Softwares

Enterprises today are experiencing a pressure to comply with information security and practice safety standards such as ISO (International Organization for Standardization) to reduce the potential liability in the event of serious security issues– let it be Physical Security or Online Internet Security. Also see Past, Present and Future of Internet Security. So inorder to maintain the information security in the organizational standards, the enterprises has to follow certain rules and regulations given by the International Organizational Standards to ensure that the information security requirements have compliance with statutory regulations of the Company.

Those include so many security measures that needs to the covered by the organization, which is given by leading security control sectors which establishes certain guidelines and general principles for initiating, implementing, maintaining, and improving information security management and the objective outlined which provide general guidance that is commonly accepted goals in an Enterprise’s information security management such as Enterprise Security policy which include information security; asset management; human resources security; physical and environmental security; communications and operations management; access control; information security incident management; compliance and much more.

When it comes to Technical / Online Internet Security, it should compliance with regulations and standards of the enterprise. In an Enterprise the systems are more vulnerable to number of threats to which some of the preventions tools and software needs to be implemented to protect intruders entering in your system. This kind of information security is achieved by implementing a suitable set of controls, which include policies, processes, procedures, organizational structures, software and hardware functions. Such kind technical security controls can be executed by the workstations, servers, enterprise security software tools, routers, switches, firewalls, and other systems that comprise our IT networks and the Internet that enable you to automate your security policies that grant you access and privileges of identification and authentication, logging and auditing to provide high level’s of security regulations and standards.

Also some of the security measures which you implement in transferring the information, Website Security using SSL (Secure Sockets Layer), EV SSL, VPN’s (Virtual Private Network), Firewall, Anti-Virus and common sense of understanding the SPAM, Palm Security and other security tools will help your organization to grow into a SECURE successful Enterprise or Organization. Also visit http://www.ezencrypt.com/

Download your Linux based Comodo Trustix Enterprise Security Product for free at http://firewall.trustix.com/small/ and also learn more about Enterprise Level Internet Security at http://kriskarthik.blogspot.com/

Monday, February 11, 2008

UK Requirement – Bill Gates is Sharing His Fortune eMail - SPAM Emails

I have made my previous posting regarding the spam stating nirosha silva , it has been since long time the mail has been in circulation. Still the next SPAM email states its being from Microsoft, with the subject UK requirement which states that “Bill Gates is sharing his fortune” But this is again an SPAM / Fradulent email where many of the people using the internet, forward this kind of mails to their friend and relative, thinking that they would be earning more. But they realize finally that its an mail from a fradulent email. Here’s the mail which I received again from some of my friends. So inorder to educate about these kinds of SPAM emails I have made his post again. Here’s the mail I received stating that For every person that you forward this e-mail to, Microsoft will pay you $245.00. I got this mail some 3 years ago, and still I am receiving it from my friends till now once in 3-4 months or so, which is still in circulation.

From: Originated from someone (email address not available)
CC: sent to so many people (inculding me)
Subject: UK Requirement

Dear Friends,

Please do not take this for a junk letter. Bill Gates is sharing his fortune. If you ignore this you will repent later. Microsoft and AOL are now the largest Internet companies and in an effort to make sure that Internet Explorer remains the most widely used program, Microsoft and AOL are running an e-mail beta test.

When you forward this e-mail to friends, Microsoft can and will track it (if you are a Microsoft Windows user) for a two week time period.

For every person that you forward this e-mail to, Microsoft will pay you $245.00, for every person that you sent it to that forwards it on, Microsoft will pay you $243.00 and for every third person that receives it, you will be paid $241.00. Within two week! s, Microsoft will contact you for your address and then send you a cheque.

For your information:

There are billions and billions of people who use Microsoft service worldwide, then why does Bill Gates wanted to share his fortune. Also a small wonder if Microsoft is going to give $245 to the person who sends the mail, will the company exist if the mail is being forwarded to all the Microsoft users? :) J

So don’t get fooled by these kinds of fake emails, Microsoft would be no way responsible if are being cheated by these kings of fraudulent emails.

I would like you to visit my “Try to understand what is SPAM” posting, to have a clear understanding on what a spam mail is and how it needs to be elimated. Also if you are a victim, just post my link in your email, and send this to friends to educate them about the kinds of SPAMS. I wish you to go through my entire blog to understand about Internet Security and the latest technology to encounter the frauds who steal your identity - which we term as Identity Theft or Phishing attacks. Be Safe and Secure Online – Happy Browsing!

To prevent from virus attacks in your computer, install an Antivirus software and if you are frequent internet user try to download internet security suite

Thursday, January 24, 2008

Latest Technology News & Developments in Comodo

Comodo NewsWire ( http://comodonewswire.blogspot.com/ ) was started to let Consumers / Customers to know about he latest happenings in Comodo. Visit http://forums.comodo.com/ to know about the products which are being developed and is going to be Developed as per the Comodo Security Experts and the views/suggestion of our Valuable Customers/Consumers. Here is an small brief about Comodo.

Comodo, through its group of Internet security companies, is a leading Certification Authority and global provider of Identity and Trust Assurance services on the Internet. Comodo secures and authenticates online transactions and communications for over 2,000,000 businesses and consumers.

With a global presence Comodo offers businesses and consumers third-generation solutions for intelligent security and authentication technologies that create trust online. Comodo's technological expertise includes PKI digital certification, Code signing certification, integrated authentication infrastructure services, Web Content authentication, Secure messaging solutions, PCI compliancy scanning, SSL digital certificates including our flagship InstantSSL brand, HackerGuardian, Banking solutions including Two Factor Authentication, and digital e-commerce services.

For additional information on Comodo - Creating Trust Online™ visit http://www.comodo.com/

Tuesday, January 08, 2008

Palm Security – Biometric Authentication for your PC – Personal Computer – by Fujitsu Laboratories Ltd.


Fujitsu Laboratories Ltd. Has developed a highly precise biometric authentication. It has the technology that can verify as person’s identity by recognizing the pattern of blood veins in the person’s palm. This new of Biometric authentication PC Security technology is more useful in the securing your PC. The use of this technology would enable convenient biometric authentication for a wide range of applications, such as safe guarding important information through log in verification for the access to sales, technical or personal data.

How this New Method of Biometric Authentication Technology does helps in PC Security?

This new 2008 technology, in which it has incorporated a prototype computer mouse, identifies an individual by the unique pattern of veins in the palm. Palm vein patterns are advantageous for this purpose because they are unique from one person to the next and expect for the size, they do not change as the individual grows. The authentication process works as follows.

The palm is first illuminated by an infrared light. The veins just beneath the skin of the palm then emit a black reflection, giving a picture of the veins of the palm.

Using a proprietary Fujitsu algorithm, the pattern is then extracted from this picture and is checked against patterns stored in the system if there is a match the person’s identity is confirmed. This biometric authentication will surely help computer users securing them from identity theft. Also some measures have been taken to build this technology into wall-plates or mobile readers for other applications – Which were previously used by having stored the thump impression. Now it would be the palm security for 2008. Biometric security is both easy to use and hard to defeat, so its no surprise that finger scanners are popping up on notebooks as well as PC peripherals. But once you have swiped them anyone can use the computer. Now around 700 people were experimented with this new technology. Fujitsu has not yet begun selling the Palm Secure PC login kit. Also keep in mind that the Palm Secure works only on Windows XP and Vista. If you want to have managed multi-user biometric authentication across the enterprise’s PC’s, you need the authentication server edition.

Continuing with the PC Security, you also need to have the Desktop Security and Internet Email security products as well. The job would be to be more safe and Secure from the world of phishing or virus attacks.

JobsNtech - Jobs & Technology - IT Security - Wishes Very Happy and a Prosperous New Year 2008

Wishing You All a Very Happy and a Prosperous New Year 2008
We hope you had a great Christmas and New Year Holiday and now back to Business. The IT Field has been booming in Chennai, India and So many IT, ITES, BPO companies has been set up here, with the headquarters in US, UK , Australia and other foreign countries. So inorder to have a secure access of the server and secure transmission of files, VPN’s are more important. And also being doing international business which includes secure and safe banking, secure financial transactions need to be carried on for online shopping too. Hence there is need for the Internet Security, to know more about the internet security measures have a look at the entire blog. And also if you are looking out for a change or wanted to pursue a career in an IT / ITES or Non-IT sector in the blooming hot IT hub Chennai, India - post your profile to JobsNtech i.e. Jobs & Technology HR Management Consultancy Services, who are currently in the look out for clients and candidatures.

Is taking a Bank Loan Good or Bad?

Definitely taking a bank loan shouldn't be a choice for you and should be the last resource if you need to. You may be wondering, why am...